mirror of
https://github.com/bitnami/charts.git
synced 2026-03-07 08:07:55 +08:00
[bitnami/valkey-cluster] Unify seLinuxOptions default value (#30322)
* [bitnami/valkey-cluster] Unify seLinuxOptions default value Signed-off-by: David Gomez <dgomezleon@vmware.com> * Update CHANGELOG.md Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> * Update README.md with readme-generator-for-helm Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> --------- Signed-off-by: David Gomez <dgomezleon@vmware.com> Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> Co-authored-by: Bitnami Containers <bitnami-bot@vmware.com>
This commit is contained in:
@@ -1,8 +1,12 @@
|
||||
# Changelog
|
||||
|
||||
## 2.0.1 (2024-11-08)
|
||||
|
||||
* [bitnami/valkey-cluster] Unify seLinuxOptions default value ([#30322](https://github.com/bitnami/charts/pull/30322))
|
||||
|
||||
## 2.0.0 (2024-10-23)
|
||||
|
||||
* [bitnami/valkey-cluster] Update all the references from to master/slave to primary/replica ([#30025](https://github.com/bitnami/charts/pull/30025))
|
||||
* [bitnami/valkey-cluster] Update all the references from to master/slave to primary/replica (#30025) ([e273ef7](https://github.com/bitnami/charts/commit/e273ef7b416321d485e586b9f69ddf12f5964fcb)), closes [#30025](https://github.com/bitnami/charts/issues/30025)
|
||||
|
||||
## <small>1.0.3 (2024-10-22)</small>
|
||||
|
||||
|
||||
@@ -33,4 +33,4 @@ name: valkey-cluster
|
||||
sources:
|
||||
- https://github.com/bitnami/charts/tree/main/bitnami/valkey-cluster
|
||||
- https://github.com/bitnami/containers/tree/main/bitnami/vakey-cluster
|
||||
version: 2.0.0
|
||||
version: 2.0.1
|
||||
|
||||
@@ -420,7 +420,7 @@ OK
|
||||
| `pdb.minAvailable` | Min number of pods that must still be available after the eviction. | `""` |
|
||||
| `pdb.maxUnavailable` | Max number of pods that can be unavailable after the eviction. | `""` |
|
||||
| `containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
|
||||
| `containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
|
||||
| `containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
@@ -476,7 +476,7 @@ OK
|
||||
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
|
||||
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
| `volumePermissions.containerSecurityContext.enabled` | Enable Containers' Security Context | `true` |
|
||||
| `volumePermissions.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
|
||||
| `volumePermissions.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `volumePermissions.containerSecurityContext.runAsUser` | User ID for the containers. | `0` |
|
||||
| `volumePermissions.containerSecurityContext.privileged` | Run container as privileged | `false` |
|
||||
| `volumePermissions.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if volumePermissions.resources is set (volumePermissions.resources is recommended for production). | `nano` |
|
||||
@@ -616,7 +616,7 @@ OK
|
||||
| `metrics.podAnnotations` | Additional annotations for Metrics exporter pod | `{}` |
|
||||
| `metrics.podLabels` | Additional labels for Metrics exporter pod | `{}` |
|
||||
| `metrics.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `metrics.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
|
||||
| `metrics.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `metrics.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `metrics.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
|
||||
| `metrics.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
@@ -660,7 +660,7 @@ OK
|
||||
| `sysctlImage.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
| `sysctlImage.mountHostSys` | Mount the host `/sys` folder to `/host-sys` | `false` |
|
||||
| `sysctlImage.containerSecurityContext.enabled` | Enable Containers' Security Context | `true` |
|
||||
| `sysctlImage.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` |
|
||||
| `sysctlImage.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `sysctlImage.containerSecurityContext.runAsUser` | User ID for the containers. | `0` |
|
||||
| `sysctlImage.containerSecurityContext.privileged` | Run privileged as privileged | `true` |
|
||||
| `sysctlImage.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if sysctlImage.resources is set (sysctlImage.resources is recommended for production). | `nano` |
|
||||
|
||||
@@ -235,7 +235,7 @@ pdb:
|
||||
##
|
||||
containerSecurityContext:
|
||||
enabled: true
|
||||
seLinuxOptions: null
|
||||
seLinuxOptions: {}
|
||||
runAsUser: 1001
|
||||
runAsGroup: 1001
|
||||
runAsNonRoot: true
|
||||
@@ -449,7 +449,7 @@ volumePermissions:
|
||||
##
|
||||
containerSecurityContext:
|
||||
enabled: true
|
||||
seLinuxOptions: null
|
||||
seLinuxOptions: {}
|
||||
runAsUser: 0
|
||||
privileged: false
|
||||
## Container resource requests and limits
|
||||
@@ -977,7 +977,7 @@ metrics:
|
||||
##
|
||||
containerSecurityContext:
|
||||
enabled: true
|
||||
seLinuxOptions: null
|
||||
seLinuxOptions: {}
|
||||
runAsUser: 1001
|
||||
runAsGroup: 1001
|
||||
runAsNonRoot: true
|
||||
@@ -1140,7 +1140,7 @@ sysctlImage:
|
||||
##
|
||||
containerSecurityContext:
|
||||
enabled: true
|
||||
seLinuxOptions: null
|
||||
seLinuxOptions: {}
|
||||
runAsUser: 0
|
||||
privileged: true
|
||||
## Container resource requests and limits
|
||||
|
||||
Reference in New Issue
Block a user